[Mip4] CFP: International workshop on Mobile Computing Security (MCS 2015) in conjunction with EUSPN 2015

Kashif Akhtar Saleem <ksaleem@KSU.EDU.SA> Mon, 27 April 2015 07:06 UTC

Return-Path: <prvs=5559156048=ksaleem@KSU.EDU.SA>
X-Original-To: mip4@ietfa.amsl.com
Delivered-To: mip4@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F6A51A87C5; Mon, 27 Apr 2015 00:06:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.51
X-Spam-Level:
X-Spam-Status: No, score=-1.51 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QT_K8ZcIw-RQ; Mon, 27 Apr 2015 00:06:07 -0700 (PDT)
Received: from smtpgw03.ksu.local (smtpgw03.ksu.edu.sa [212.57.193.38]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A87BD1A8784; Mon, 27 Apr 2015 00:06:05 -0700 (PDT)
Received: from EXMBX04.KSU.LOCAL (10.190.44.33) by smtpgw03.ksu.local (10.190.15.22) with Microsoft SMTP Server (TLS) id 14.3.99.0; Mon, 27 Apr 2015 10:05:52 +0300
Received: from EXMBX02.KSU.LOCAL (10.190.44.31) by EXMBX04.KSU.LOCAL (10.190.44.33) with Microsoft SMTP Server (TLS) id 15.0.1104.1; Mon, 27 Apr 2015 10:05:54 +0300
Received: from EXMBX02.KSU.LOCAL ([fe80::78c1:cc55:eba2:eb88]) by EXMBX02.KSU.LOCAL ([fe80::78c1:cc55:eba2:eb88%14]) with mapi id 15.00.1104.000; Mon, 27 Apr 2015 10:05:54 +0300
From: Kashif Akhtar Saleem <ksaleem@KSU.EDU.SA>
To: Abdelouahid Ahmed Derhab <abderhab@KSU.EDU.SA>
Thread-Topic: International workshop on Mobile Computing Security (MCS 2015) in conjunction with EUSPN 2015
Thread-Index: AQHQgLiZHqQI8ZUSP0S17/bNdXrB7A==
Date: Mon, 27 Apr 2015 07:05:54 +0000
Message-ID: <D163BA19.29DC%ksaleem@ksu.edu.sa>
References: <CAHfqBvv927YoO1S8cXw3sJ-JnZZCGY847obxPgynuP0iyCGH-w@mail.gmail.com> <CAHfqBvt48Wkr4P+ZcJzt5D+y9hokrFOKOkBkijBih3tQNG_f7g@mail.gmail.com> <CALBZCJJKGXgZMpKywakFnT8dBW9+HG4+F5t9BxkXRD4TwS9Kvg@mail.gmail.com>
In-Reply-To: <CALBZCJJKGXgZMpKywakFnT8dBW9+HG4+F5t9BxkXRD4TwS9Kvg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.9.150325
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.190.44.55]
Content-Type: multipart/alternative; boundary="_000_D163BA1929DCksaleemksuedusa_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/mip4/vRZkBJ6S4rF9PZ69aM6kd2-dzeQ>
X-Mailman-Approved-At: Mon, 27 Apr 2015 02:05:06 -0700
Subject: [Mip4] CFP: International workshop on Mobile Computing Security (MCS 2015) in conjunction with EUSPN 2015
X-BeenThere: mip4@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Mobility for IPv4 <mip4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mip4>, <mailto:mip4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mip4/>
List-Post: <mailto:mip4@ietf.org>
List-Help: <mailto:mip4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mip4>, <mailto:mip4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Apr 2015 07:06:12 -0000

***************************************************************************
We apologize if you receive multiple copies of this CFP.


***************************************************************************
International workshop on Mobile Computing Security
(MCS 2015)
In conjunction with the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks
(EUSPN 2015)
Berlin, Germany on September 27-30, 2015
Workshop Website: https://sites.google.com/site/mcs2015msc
***************************************************************************

Important Dates
===============
Submission Deadline:      May 26, 2015
Author Notification:         June 26, 2015
Final Manuscript:              July 26, 2015

SCOPE
=======
Technological advances in recent years have provided significant increases in the computing power and networking capabilities of mobile devices. For example, many smartphones and personal digital assistants (PDAs) currently employ powerful processors and have Internet broadband connectivity that rival that of desktop computers and laptops.  For these reasons, mobile devices are being used for many applications including social networking, and business applications like: online banking. Because these devices are ubiquitous, they are high-value targets for cyber criminals that seek financial gains.
Mobile devices are still suffering from many security challenges. The security policy offered by the mobile platforms is loose because it allows developers and users to install any application. As a result, we witnessed an increasing number of attacks and malware targeting mobile platforms like Android and iOS, and which caused serious issues for the user. For example, the malware can integrate compromised mobile devices into a botnet, it can also send SMS messages to premium numbers without the user’s knowledge, and hence the user’s bill is charged. In addition, the users are increasingly using their devices to handle their private information. However, the devices provide insufficient data security and data protection.
This workshop aims at gathering researchers and practitioners working on mobile computing security to share ideas and new research innovations in the field.
The topics of interest include (but are not limited to):
• Smartphone security.
• Vulnerability analysis for smartphones.
• Data protection and privacy.
• Security and privacy of operating systems, middleware, and applications.
• Evaluation of mobile security solutions.
• Mobile malware collection, statistics, and analysis;
• Mobile malware detection.
• Bots on mobile devices.
• Mobile botnet detection.
• Mobile botnet design and countermeasures.
• Reverse engineering and automated analysis of mobile malware.
• Traffic monitoring and detection algorithms for mobile platforms.
• Cloud security and privacy solutions for mobile devices.
• Mobile device forensics.
• Mobile services and social networking security.
• Security for smart payment applications.
• Test beds and case studies for secure mobile platforms.
• Formal models and architecture design for secure mobile platforms.
• Virtualization solutions for mobile security.
• Web browser security on mobile devices.


Publication
==========
All MCS-2015 accepted papers will be published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on www.Elsevier.com<http://www.Elsevier.com> and on Elsevier content platform ScienceDirect (www.sciencedirect.com<http://www.sciencedirect.com>), and will be freely available worldwide. All papers in Procedia will be indexed by Scopus (www.scopus.com<http://www.scopus.com>) and by Thomson Reuters’ Conference Proceeding Citation Index http://thomsonreuters.com/conference-proceedings-citation-index/. The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (http://dblp.uni-trier.de/).


Submission
==========
Authors are requested to submit their papers electronically in PDF format. Blind submissions should be made through the Easychair system: https://easychair.org/conferences/?conf=mcs20150
More information about paper formatting instructions, submission and registration can be found at: https://sites.google.com/site/mcs2015msc


Workshop Chairs
==============
Abdelouahid Derhab, King Saud University, Saudi Arabia
Mohamed Guerroumi, USTHB University, Algeria
Kashif Saleem, CoEIA, King Saud University, Saudi Arabia


Technical Program Committee
==========================
Abdullah Bin Gani, University of Malaya, Malaysia.
Adam Bates, University of Florida, USA.
Ali Feizollah, University of Malaya, Malaysia.
Damien Octeau, Pennsylvania State University, USA.
Gang Tan, Lehigh University, USA.
Garth V. Crosby, Southern Illinois University Carbondale, USA.
Hsiang-Cheh Huang, National University of Kaohsiung, Taiwan.
Hussain Almohri, Kuwait University, Kuwait.
Jalal Al-Muhtadi, King Saud University, Saudi Arabia.
John C.S. Lui, Chinese University of Hong Kong, China.
Juan Pedro Muñoz-Gea, Universidad Politécnica de Cartagena, Spain.
Karim Elish,  Virginia Tech, USA.
Kouichi Sakurai, Kyushu University, Japan.
Lanier A. Watkins, The Johns Hopkins University Applied Physics Laboratory, USA.
Lotfi ben Othmane, Technische Universität Darmstadt, Germany.
Mauro Conti, University of Padua, Italy.
Mohamad Badra, Zayed University, The United Arab Emirat.
Muath Al-Khalaf, King Saud University, Saudi Arabia.
Reaz Ahmed, University of Waterloo, Canada.
Pedro Peris-Lopez, Universidad Carlos III de Madrid, Spain.
Qiang Tang, University of Luxembourg, Luxembourg.
Shouhuai Xu, University of Texas at San Antonio, USA.
Wissam Mallouli, Montimage, France.
Yajin Zhou, North Carolina State University, USA.
Yao Guo, Peking University, China.
Youssef Iraqi, Khalifa University of Science, Technology, and Research, United Arab Emirates.

________________________________

Disclaimer:
This communication is intended for the above named person and is confidential and / or legally privileged. Any opinion(s) expressed in this communication are not necessarily those of KSU (King Saud University). If it has come to you in error you must take no action based upon it, nor must you print it, copy it, forward it, or show it to anyone. Please delete and destroy the e-mail and any attachments and inform the sender immediately. Thank you.
KSU is not responsible for the political, religious, racial or partisan opinion in any correspondence conducted by its domain users. Therefore, any such opinion expressed, whether explicitly or implicitly, in any said correspondence is not to be interpreted as that of KSU.
KSU may monitor all incoming and outgoing e-mails in line with KSU business practice. Although KSU has taken steps to ensure that e-mails and attachments are free from any virus, we advise that, in keeping with best business practice, the recipient must ensure they are actually virus free.